The Complete Cyber Security Course Hackers Exposed!

Categories:Mobile DevelopmentSoftware Development
This course includes

Welcome and Introduction to the Instructor!
2:06
Security Quick Win!
11:59
Goals and Learning Objectives - Volume 1
2:30
Target Audience
1:54
Study Recommendations
5:16
Course updates
00:40
Cyber Security and Ethical Hacking Careers
3:45

Theory and Practical
1:08
Goals and Learning Objectives
00:41
Protect What You Value
4:37
What is Privacy, Anonymity and Pseudonymity
4:35
Security, Vulnerabilities, Threats and Adversaries
4:37
Asset Selection
3:21
Threat Modeling and Risk Assessments
7:51
Security vs Privacy vs Anonymity - Can we have it all
1:56
Confidentiality, Integrity and Availability - (Security Attributes)
9:22
Defense In Depth
1:36
The Zero Trust Model
3:40

Goals and Learning Objectives
00:43
Why You Need Security – The Value Of A Hack
5:14
The Top 3 Things You Need To Stay Safe Online
1:23
Security Bugs and Vulnerabilities - The Vulnerability Landscape
9:35
Hackers, crackers and cyber criminals
2:32
Malware, viruses, rootkits and RATs
6:52
Spyware, Adware, Scareware, PUPs & Browser hijacking
4:44
What is Phishing, Vishing and SMShing
15:06
Spamming & Doxing
3:15
Social engineering - Scams, cons, tricks and fraud
5:31
CPU Hijackers - Crypto Mining Malware and Cryptojackers
8:42
Darknets, Dark Markets and Exploit kits
8:01
Governments, spies and secret stuff part I
5:13
Governments, spies and secret stuff part II
10:35
Regulating encryption, mandating insecurity & legalizing spying
14:37
Trust & Backdoors
10:14
Censorship
2:24
Cyber Threat Intelligence – Stay Informed
1:12

Goals and Learning Objectives
00:24
Symmetric Encryption
9:54
Asymmetric Encryption
10:17
Digital Signatures
4:45
Secure Sockets Layer (SSL) and Transport layer security (TLS)
13:26
SSL Stripping
12:02
HTTPS (HTTP Secure)
7:00
Digital Certificates
6:21
Certificate Authorities and HTTPS
14:07
End-to-End Encryption (E2EE)
1:57
Steganography
8:12
How Security and Encryption is Really Attacked
2:42

Goals and Learning Objectives
00:28
Introduction to Setting up a Testing Environment Using Virtual Machines
10:01
Vmware
10:55
Virtual box
12:10
Kali Linux 2018
4:11

Goals and Learning Objectives
00:37
Security Features and Functionality
5:56
Security Bugs and Vulnerabilities
5:31
Usage Share
5:01
windows 10 - Privacy & Tracking
6:08
Windows 10 - Disable tracking automatically
4:42
Windows 10 - Tool Disable Windows 10 Tracking
8:14
Windows 10 – Cortana
3:00
Windows 10 – Privacy Settings
9:40
Windows 10 - WiFi Sense
4:16
Windows 7, 8 and 8.1 - Privacy & Tracking
7:19
Mac - Privacy & Tracking
4:28
Linux and Unix “like” Operating systems
3:30
General Use Operating Systems (Windows, MacOS and Linux)
4:09
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
5:04
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
2:55
Anonymity Focused Operating Systems (Tails and Whonix OS)
2:56
Penetration Testing and Ethical Hacking Focused Operating Systems
00:49
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
2:31
Linux - Debian 8 Jessie - Virtual box guest additions Issue
6:26

Goals and Learning Objectives
00:25
The Importance of Patching
3:47
Windows 7 - Auto Update
1:15
Windows 10 - Auto Update
1:25
Windows 10 - Auto Update
1:25
Windows - Criticality and Patch Tuesday
3:46
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
8:34
Linux - Debian - Patching
10:58
Mac - Patching
6:58
Firefox - Browser and extension updates
4:23
Chrome - Browser and extension updates
1:13
IE and Edge - Browser and extention updates
00:46
Auto updates - The Impact to privacy and anonymity
1:41

Goals and Learning Objectives - Removing Privilege
2:53
Windows 7 - Not using admin
3:32
Windows 8 and 8.1 - Not using admin
4:15
Windows 10 - Not using admin
3:25

Goals and Learning Objectives
00:26
Information Disclosure and Identity Strategies for Social Media
12:34
Identify Verification and Registration
5:05
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
10:22
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
5:02

Goals and Learning Objectives
00:21
Security Domains
10:00

Introduction to Isolation and Compartmentalization
2:10
Physical and Hardware Isolation - How to change the Mac Address
7:10
Physical and Hardware Isolation - Hardware Serials
11:18
Virtual Isolation
8:36
Dual Boot
2:41
Built-in Sandboxes and Application Isolation
3:07
Windows - Sandboxes and Application Isolation
5:57
Windows - Sandboxes and Application Isolation - Sandboxie
11:29
Linux - Sandboxes and Application Isolation
3:04
Mac - Sandboxes and Application Isolation
6:34
Virtual Machines
10:51
Virtual Machine Weaknesses
10:31
Virtual Machine Hardening
9:15
Whonix OS - Weaknesses
4:18
Security Domains, Isolation and Compartmentalization
4:42

Congratulations
00:58
Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
16:23
Sample from Vol 2 - Password cracking part 2
7:09
Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
15:21
Sample from Vol 4 - Email clients, protocols and authentication
13:17

BONUS

Reviews (0)

This course includes